Cybersecurity

Russian Hackers Exploit Routers to Steal Microsoft Office Tokens

Apr 15, 2026 1 min read by Ciro Simone Irmici
Russian Hackers Exploit Routers to Steal Microsoft Office Tokens

State-backed Russian hackers are leveraging known flaws in older internet routers to steal Microsoft Office authentication tokens, gaining persistent access to user accounts and data.

Your home or office internet router, often an overlooked device, is now a prime target for sophisticated cyberattacks. Security experts recently warned that hackers linked to Russia's military intelligence are actively exploiting vulnerabilities in these devices to steal authentication tokens from Microsoft Office users, granting them stealthy, long-term access to your sensitive data.

The Quick Take

  • Hackers linked to Russia's military intelligence are behind the campaign.
  • The attacks exploit known vulnerabilities in older internet routers.
  • The primary goal is to steal Microsoft Office authentication tokens.
  • Stolen tokens allow persistent access to Microsoft Office accounts without needing passwords.
  • The campaign is described as a "spying campaign" aimed at mass harvesting user data.

What's Happening

Security researchers have recently uncovered a concerning cyber campaign where state-backed Russian hackers are actively targeting common vulnerabilities found in older internet routers. These flaws, which have been known within the cybersecurity community, are being exploited to gain unauthorized access to these networking devices.

Once a router is compromised, the attackers pivot their efforts towards users of Microsoft Office. Their objective is to mass harvest authentication tokens, which are essentially digital keys that allow a user to remain logged into their Microsoft Office accounts (including Outlook, Word, Excel, and OneDrive) without repeatedly entering a password. This ongoing "spying campaign" allows the Russian military intelligence-linked hackers to quietly siphon these tokens, granting them persistent and stealthy access to a user's cloud-based Microsoft services.

The method is particularly insidious because it bypasses traditional password protections and can even circumvent some forms of multi-factor authentication if the token itself is compromised. By focusing on routers, which often have less rigorous security updates and are frequently forgotten about by users, the attackers establish a covert foothold from which to launch their token-stealing operations.

Why It Matters

This attack vector is critically important for everyday users because it leverages a device that many people assume is inherently secure or at least protected by their internet service provider: their home or small business router. For users of Microsoft Office, which includes millions globally for work, personal files, and communication, the theft of authentication tokens means that hackers can access emails, documents, calendars, and cloud storage without ever needing your password. This can lead to severe privacy breaches, data theft, and even corporate espionage.

The danger is compounded by the fact that these authentication tokens offer persistent access. Unlike a password, which might be reset after a breach is detected, a stolen token can continue to grant access until it expires or is explicitly revoked. This means an attacker could maintain a presence in your Microsoft Office account for an extended period, quietly siphoning data or monitoring communications, making detection incredibly difficult for the average user.

Moreover, the focus on “older Internet routers” highlights a broader cybersecurity concern: outdated hardware and software are low-hanging fruit for sophisticated attackers. Many individuals and small businesses continue to use routers that are no longer receiving critical security updates, leaving gaping holes in their digital perimeter. This campaign serves as a stark reminder that every link in your digital chain, especially foundational devices like routers, must be secured to protect your most valuable digital assets.

What You Can Do

  • Update Your Router's Firmware: Check your router manufacturer's website for the latest firmware updates. Many routers have an option to update directly through their web interface. Enable automatic updates if your router supports it.
  • Change Default Router Credentials: If you're still using the default username and password for your router's admin interface (e.g., 'admin'/'password'), change them immediately to strong, unique credentials.
  • Enable Multi-Factor Authentication (MFA) on Microsoft Accounts: Even if a token is stolen, MFA adds an extra layer of defense, making it harder for attackers to use the token without a second verification step.
  • Periodically Review Microsoft Account Activity: Log into your Microsoft account security dashboard regularly to check for unusual login attempts or active sessions from unfamiliar locations or devices.
  • Consider Replacing Older Routers: If your router is several years old and no longer receives firmware updates from the manufacturer, it might be time to invest in a newer model that offers modern security features and ongoing support.
  • Use a Virtual Private Network (VPN): A reputable VPN can encrypt your internet traffic, adding a layer of security between your devices and your router, making it harder for compromised routers to snoop on your data.

Common Questions

Q: What exactly are 'authentication tokens'?

A: Authentication tokens are like temporary digital passes that prove you've already logged in. They allow you to stay logged into services like Microsoft Office without re-entering your password every time, making it convenient but also a target if stolen.

Q: How do I know if my router is 'old' or vulnerable?

A: Generally, if your router is more than 3-5 years old and hasn't received firmware updates from its manufacturer in a while, it might be considered older and potentially vulnerable. Check your manufacturer's support website for your specific model.

Q: Does changing my Microsoft password revoke these stolen tokens?

A: Changing your password is a good step, but it might not always immediately invalidate an actively used token. For full security, you should also review and revoke active sessions/devices in your Microsoft account security settings, forcing all tokens to refresh.

Sources

Based on content from Krebs on Security.

Key Takeaways

  • Russian intelligence-linked hackers are exploiting flaws in older internet routers.
  • Their primary goal is to steal Microsoft Office authentication tokens.
  • Stolen tokens enable persistent, stealthy access to user accounts and data.
  • The campaign bypasses traditional password protections and can impact multi-factor authentication.
  • Updating router firmware and strengthening router security are critical defenses.

Ciro Simone Irmici
Author, Digital Entrepreneur & AI Automation Creator
Written and curated by Ciro Simone Irmici · About TechPulse Daily